1/45
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are the three fundamental principles of information security commonly referred to as CIA?
Confidentiality, Integrity, Availability.
What is the main goal of a Denial of Service (DoS) attack?
To prevent a system from performing normal functions.
What distinguishes malware from other types of software?
Malware enters a system without the owner's knowledge or consent.
Define social engineering in the context of security.
A means of gathering information for an attack from individuals.
What is the purpose of phishing attacks?
To trick users into providing private information.
What are the five general steps of an attack?
Reconnaissance, Weaponization, Delivery, Exploitation, Installation.
What is ARP poisoning?
A technique that modifies the MAC address in the ARP cache to redirect traffic.
How do buffer overflow attacks operate?
They store data outside the bounds of allocated memory, potentially allowing attackers to execute malicious code.
What is the difference between a virus and a worm?
A virus attaches to files and requires user action to spread, whereas a worm spreads itself across networks automatically.
What type of malware is designed to gather information without user consent?
Spyware.
Define what a botnet is in the context of malware.
A network of infected computers that can be controlled remotely by an attacker.
What is the function of a keylogger?
To capture the user's keystrokes for later retrieval by the attacker.
What is the goal of a cyberterrorist?
To attack based on ideology or beliefs that provoke panic or violence.
What do we call attackers who use pre-made hacking software to cause damage?
Script kiddies.
Define the term 'insider attack.'
An attack carried out by employees or contractors with legitimate access to the organization.
What does 'availability' in information security refer to?
Information being accessible to authorized users.
What is an example of a physical social engineering attack?
Tailgating.
What is the difference between first-party and third-party cookies?
First-party cookies are created by the website being visited, while third-party cookies are created by advertisers.
What is ransomware?
Malware that locks users out of their systems until a payment is made.
What is the purpose of a vulnerability assessment process?
To identify and evaluate vulnerabilities in a system.
What does the term 'exploitation' refer to in the context of an attack?
Executing the weapon against a target system.
How can DNS poisoning be described?
Substituting DNS addresses to redirect users to malicious sites.
What kind of attack is known for overwhelming a server with requests?
Distributed Denial of Service (DDoS) attack.
What is a 'maybe return address' in a buffer overflow attack?
A manipulated address that redirects the program to malicious code.
What does the acronym 'CIA' stand for in information security?
Confidentiality, Integrity, Availability.
What is the primary goal of different access rights and permissions?
To control who has the ability to access or use system resources.
Fill in the blank: The practice of protecting computer systems from theft or damage is known as ________ security.
information security.
Fill in the blank: ________ is a type of malware that encrypts files and demands payment for the decryption key.
Ransomware.
Fill in the blank: A ________ attack gains unauthorized access to a network or system by exploiting vulnerabilities.
hacking.
Fill in the blank: The term ________ refers to the unauthorized use of someone else's information for personal gain.
identity theft.
Fill in the blank: ________ is a technique used to gain sensitive information by pretending to be a trustworthy source.
Phishing.
Fill in the blank: A ________ is a malicious software that replicates itself and spreads to other computers.
worm.
Fill in the blank: ________ refers to the protection of data from unauthorized access and alteration.
Data integrity.
Fill in the blank: In cybersecurity, the acronym ________ refers to the process of identifying, assessing, and prioritizing risks.
risk management.
Fill in the blank: ________ is a type of social engineering attack where an unauthorized person follows someone into a restricted area.
Tailgating.
Fill in the blank: An ________ is a malicious code that is embedded in legitimate software and executed when the user runs the software.
Trojan.
What does 'confidentiality' mean in information security?
Ensuring that information is not disclosed to unauthorized individuals.
What is integrity in the context of data security?
The assurance that data is accurate and trustworthy.
What is the main characteristic of a phishing attack?
It attempts to steal sensitive information such as usernames and passwords.
Describe the term 'Malware'.
Malicious software designed to harm or exploit any programmable device.
What type of attack involves eavesdropping on private network traffic?
Man-in-the-middle attack.
What does the term 'pen testing' stand for?
Penetration testing, a simulated cyber attack to evaluate security.
What is the primary function of firewalls?
To monitor and control incoming and outgoing network traffic.
How can data breach be defined?
An incident where unauthorized access is gained to confidential data.
What are the two main types of encryption?
Symmetric and asymmetric encryption.
What is the role of antivirus software?
To detect, prevent, and remove malicious software from a computer system.